Method is determined based on the wireless Mesh netword secure routing path of dynamic prestigeTechnical field
The invention belongs to technical field of network security, pacify more particularly to a kind of wireless Mesh netword based on dynamic prestigeSystem-wide is by determining method of path.
Background technique
With the development of network technology, wireless Mesh netword (wirelss mesh network, WMN) is widely used inMultiple fields.The opening of WMN transmission medium and the dynamic of network topology structure, so that the network is easily by internal maliceThe attack of node.Simultaneously because internal malicious node can use legal authorization and be pretended, traditional routed path determination sideMethod can not be accurately identified in routing procedure, be destroyed during route transmission so as to cause bulk information.Therefore,How effectively to identify that malicious node is resisted in routing procedure to internal attack, becomes the heat of current WMN Security routing Mechanism StudyPoint problem.
Sarma proposes a kind of security routing (secure hierarchical and based on secured hierarchical and roleRole based routing protocol for mobile wireless sensor network, SHaRP), to routingThe quality safety value of calculate node credit value and link, is selected safe according to calculated result while control information is encryptedRouted path.Bounouni etc. proposes a kind of node credit value and contribution margin mixing confirmation method (new hybridAcknowledgment approach, NHACK), contribution system is combined using the prestige value calculating method based on monitoring confirmation technologyContribution margin of the operator node in route establishment process is counted, selects safe and efficient routing road according to node credit value and contribution marginDiameter.Wu Jun etc. proposes a kind of credible chance routing forwarding model based on feedback credibility, passes through feedback credibility model evaluationNodes ' behavior, and then identify the malicious node in wireless Mesh netword, realize the defence of collusion attack in routing procedure.
However existing method is not comprehensive enough to the evaluation of node in routing procedure, lacks timeliness and dynamic, does not haveOverall merit is made to node in conjunction with node historical behavior and current behavior, causes the identification of malicious node in routing procedure inadequateAccurately.
Summary of the invention
To solve the above-mentioned problems, the wireless Mesh netword peace based on dynamic prestige that the purpose of the present invention is to provide a kind ofSystem-wide is by determining method of path.
In order to achieve the above object, the wireless Mesh netword secure routing path provided by the invention based on dynamic prestige is trueThe method of determining includes the following steps carried out in order:
1) routing information request RREQ is generated by source node j, and broadcasts to its neighbor node;
2) after the arbitrary node i in neighbor node receives solicited message RREQ, local credit value database is inquired, search hasThe data packet forwarding information for closing source node j calculates the direct credit value T of source node j according to query resulti;jdir, and savedIn local credit value database;
3) threshold value of credit value mathematic expectaion is set as β;Calculate the mathematic expectaion E of the direct credit value of source node j(Ti;jdir), if E (Ti;jdir) < β determines source node j then for malicious node and is isolated;If E (Ti;jdir) > β or no footEnough data carry out the mathematic expectaion E (T of the direct credit value of source node ji;jdir) calculating, then perform the next step and judged suddenly;
4) node i broadcasts credit value query information to its neighbor node, it is desirable that it provides the recommendation about source node jBreath starts recommendation reputation value calculating process;
5) after any common neighbor node of node i and source node j receive credit value query information as recommended node m,It inquires local credit value database and feeds back to node i for query result as recommendation information;
6) node i arranges the recommendation information that all neighbor nodes received are fed back, and calculates the recommendation of source node jCredit value Ti:jind;
7) node i calculates the synthesis prestige of source node j according to the above-mentioned direct credit value being calculated and recommendation reputation valueValue Ti;jsynAnd the current composite credit value NewT as source node ji:jsyn, gone through in conjunction with source node j in credit value databaseHistory integrates credit value OldTi:jsynCalculate the dynamic credit value DynT of source node ji:jsyn;
8) the mathematic expectaion E (DynT of source node j dynamic credit value is calculatedi:jsyn), if E (DynTi:jsyn) < β, then node iDetermine that source node j for malicious node and is isolated;If E (DynTi:jsyn) > β, then determine source node j for trusted node and to itsSend route response message RREP;
9) after source node j receives response message RREP, step 2)-step 8) is executed to judge whether node i is credible sectionPoint;If node i is determined as trusted node by source node j, data transmitting is carried out as the next-hop node in routing, it is noThen it is isolated;
10) circulation executes step 2)-step 9), until finding out source node j to routing satisfactory between destination nodePath.
In step 2), the direct credit value T of the calculating source node ji;jdirMethod be combined with subjective logic reasonBy i.e. Ti;jdir=(bi:jdir, di:jdir, ui:jdir, a), wherein a indicates that node i inclines to believe in the degree of source node j, uniformly takesValue is 0.5;bi:jdir、di:jdirAnd ui:jdirNode i is respectively indicated to the trusting degree of source node j, distrust degree and is not knownDegree, their calculation formula are as follows:
Wherein, si:jIndicate the quantity that source node j successfully forwarded from the data packet that node i receives;fi:jExpression source sectionThe quantity that point j is abandoned from the data packet that node i receives.
In step 3), the mathematic expectaion E (T of the direct credit value of source node ji;jdir) calculation formula it is as follows:
In step 6), the recommendation reputation value T of the source node ji:jind=(bi:jind, di:jind, ui:jind, a),In, it is 0.5 that a, which unifies value,;bi:jind、di:jindAnd ui:jindCalculation formula it is as follows:
Wherein, bm:jdir、dm:jdirAnd um:jdirRespectively indicate recommended node m to the trusting degree of source node j, distrust journeyDegree and uncertainty degree, the same formula of their calculation method (1);The quantity of n expression recommended node;hmIndicate any one recommendationThe weight factor of node m, calculation method are as follows:
Wherein, E (Ti:mdir) node i is represented to the mathematic expectaion of the direct credit value of recommended node m.
In step 7), the synthesis credit value T of the source node ji;jsyn=(bi:jsyn, di:jsyn, ui:jsyn, a);ItsIn, it is 0.5 that a, which unifies value,;bi:jsyn、di:jsynAnd ui:jsynCalculation formula it is as follows:
In step 7), the dynamic credit value DynT of the source node ji:jsynCalculation formula is as follows:
DynTi:jsyn=τ × ω1×OldTi:jsyn+ω2×NewTi:jsyn  (6)
Wherein, OldTi:jsynIndicate the comprehensive credit value of the history of source node j, set node integrate credit value calculating cycle as10s, then the history of source node j integrates credit value OldTi:jsynThe synthesis credit value for being source node j before 10s;NewTi:jsynTableShow the current composite credit value of source node j;ω1And ω2Respectively indicate the comprehensive credit value of history and current composite letter of source node jThe weight factor of reputation value, since the current composite credit value of node credit value more comprehensive than history has higher reference value, becauseThis ω1And ω2Meet: 0 < ω1<ω2< 1, ω1+ω2=1;τ is decay factor, indicates the decaying journey of history credit value at any timeDegree, 0 < τ < 1.
In step 8), the mathematic expectaion E (DynT of the source node j dynamic credit valuei:jsyn) calculation formula is as follows:
Compared with prior art, the wireless Mesh netword secure routing path provided by the invention based on dynamic prestige determinesMethod malicious node discrimination with higher, and network throughput can be effectively improved, resist internal malicious node attack.
Detailed description of the invention
Fig. 1 is that the wireless Mesh netword secure routing path provided by the invention based on dynamic prestige determines method flowFigure.
Specific embodiment
With reference to the accompanying drawing and specific embodiment the present invention is described further, but following embodiments are absolutely not to this hairIt is bright to have any restrictions.
As shown in Figure 1, the wireless Mesh netword secure routing path provided by the invention based on dynamic prestige determines methodIncluding the following steps carried out in order:
1) routing information request RREQ is generated by source node j, and broadcasts to its neighbor node;
2) after the arbitrary node i in neighbor node receives solicited message RREQ, local credit value database is inquired, search hasThe data packet forwarding information for closing source node j calculates the direct credit value T of source node j according to query resulti;jdir, and savedIn local credit value database;
The direct credit value T of the calculating source node ji;jdirMethod combine Subjective Logic Theory, i.e. Ti;jdir=(bi:jdir, di:jdir, ui:jdir, a), wherein a indicates that node i inclines to believe in the degree of source node j, and unified value is 0.5;bi:jdir、di:jdirAnd ui:jdirNode i is respectively indicated to the trusting degree of source node j, distrust degree and uncertainty degree, itCalculation formula it is as follows:
Wherein, si:jIndicate the quantity that source node j successfully forwarded from the data packet that node i receives;fi:jExpression source sectionThe quantity that point j is abandoned from the data packet that node i receives.
3) threshold value of credit value mathematic expectaion is set as β;Calculate the mathematic expectaion E of the direct credit value of source node j(Ti;jdir), if E (Ti;jdir) < β determines source node j then for malicious node and is isolated;If E (Ti;jdir) > β or no footEnough data carry out the mathematic expectaion E (T of the direct credit value of source node ji;jdir) calculating, then perform the next step and judged suddenly;
Mathematic expectaion E (the T of the direct credit value of source node ji;jdir) calculation formula it is as follows:
4) node i broadcasts credit value query information to its neighbor node, it is desirable that it provides the recommendation about source node jBreath starts recommendation reputation value calculating process;
5) after any common neighbor node of node i and source node j receive credit value query information as recommended node m,It inquires local credit value database and feeds back to node i for query result as recommendation information;
6) node i arranges the recommendation information that all neighbor nodes received are fed back, and calculates the recommendation of source node jCredit value Ti:jind;
The recommendation reputation value T of the source node ji:jind=(bi:jind, di:jind, ui:jind, a), wherein a unifies valueIt is 0.5;bi:jind、di:jindAnd ui:jindCalculation formula it is as follows:
Wherein, bm:jdir、dm:jdirAnd um:jdirRespectively indicate recommended node m to the trusting degree of source node j, distrust journeyDegree and uncertainty degree, the same formula of their calculation method (1);The quantity of n expression recommended node;hmIndicate any one recommendationThe weight factor of node m, calculation method are as follows:
Wherein, E (Ti:mdir) node i is represented to the mathematic expectaion of the direct credit value of recommended node m, the bigger expression of value pushes awayThe credibility for recommending node m is higher, corresponding weight factor hmBigger, the recommendation information of recommended node m is in final recommendationShared specific gravity is also bigger in reputation value.
7) node i calculates the synthesis prestige of source node j according to the above-mentioned direct credit value being calculated and recommendation reputation valueValue Ti;jsynAnd the current composite credit value NewT as source node ji:jsyn, gone through in conjunction with source node j in credit value databaseHistory integrates credit value OldTi:jsynCalculate the dynamic credit value DynT of source node ji:jsyn;
The synthesis credit value T of the source node ji;jsyn=(bi:jsyn, di:jsyn, ui:jsyn, a);Wherein, a unifies valueIt is 0.5;bi:jsyn、di:jsynAnd ui:jsynCalculation formula it is as follows:
The dynamic credit value DynT of the source node ji:jsynCalculation formula is as follows:
DynTi:jsyn=τ × ω1×OldTi:jsyn+ω2×NewTi:jsyn  (6)
Wherein, OldTi:jsynIndicate the comprehensive credit value of the history of source node j, set node integrate credit value calculating cycle as10s, then the history of source node j integrates credit value OldTi:jsynThe synthesis credit value for being source node j before 10s;NewTi:jsynTableShow the current composite credit value of source node j;ω1And ω2Respectively indicate the comprehensive credit value of history and current composite letter of source node jThe weight factor of reputation value, since the current composite credit value of node credit value more comprehensive than history has higher reference value, becauseThis ω1And ω2Meet: 0 < ω1<ω2< 1, ω1+ω2=1;τ is decay factor, indicates the decaying journey of history credit value at any timeDegree, 0 < τ < 1.
8) the mathematic expectaion E (DynT of source node j dynamic credit value is calculatedi:jsyn), if E (DynTi:jsyn) < β, then node iDetermine that source node j for malicious node and is isolated;If E (DynTi:jsyn) > β, then determine source node j for trusted node and to itsSend route response message RREP;
Mathematic expectaion E (the DynT of the source node j dynamic credit valuei:jsyn) calculation formula is as follows:
9) after source node j receives response message RREP, step 2)-step 8) is executed to judge whether node i is credible sectionPoint;If node i is determined as trusted node by source node j, data transmitting is carried out as the next-hop node in routing, it is noThen it is isolated;
10) circulation executes step 2)-step 9), until finding out source node j to routing satisfactory between destination nodePath.